The Accelerator programme run by The Data Lab between 19 April 2018 - 06 September 2018 was a Scottish Government collaborative project, open to employees of the Scottish Government, the Information Services Division, the National Records of Scotland and Registers of Scotland. Employees applying to take part had a background in statistics, . . .
I’ve recently presented a toy Shiny app at the Edinburgh Data Visualization Meetup to demonstrate how Shiny can be used to explore data interactively.
In my code-assisted walkthrough, I began by discussing the data used: a set of records detailing customer purchases made on Black Friday (i.e., each customer was given a unique ID, . . .
We are delighted to announce our complete list of keynote speakers for the upcoming DataTech19 conference (organised by The Data Lab as part of DataFest), which now includes Debbie Bard, expert in machine learning at scale and data-intensive computing for experimental science, from the National Energy Research Scientific Computing . . .
We have further updates on DataTech19, Scotland’s first technical data science conference!
We are pleased to announce our second confirmed keynote speaker for DataTech19: Mine Çetinkaya-Rundel (Associate Professor of the Practice, Duke University, and Data Scientist + Professional Educator at RStudio). Mine’s work focuses . . .
Join us for DataTech19, Scotland’s first technical data science conference as part of DataFest
The Data Lab is delighted to introduce a new event to the DataFest family: DataTech (14 March 2019, Edinburgh). This technical, one-day data science conference will cater to a diverse audience including analysts, developers, . . .
Recently I've finished work on a project intended to visualise the traffic flow within a subsidised transport service, operated by a Scottish council. This visualisation needed to display variations in traffic flow conditional on factors such as the time of day, day of the week, journey purpose, as well as other criteria. . . .
Some options and tips
Why would you need to do this? Say, for instance, you are dealing with sensitive data that should not leave a specific system, or quite simply that you are away on a work retreat - but your laptop is far less powerful than your work desktop computer which you left behind - so you want to keep using it from a distance. For such reasons, . . .